Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

Domestic Military Intelligence is Back

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » Editorials & Other Articles Donate to DU
 
Clara T Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Dec-05-05 11:05 PM
Original message
Domestic Military Intelligence is Back
Edited on Mon Dec-05-05 11:06 PM by Clara T
William M. Arkin on National and Homeland Security

Domestic Military Intelligence Is Back

Code Name of the Week: Cornerstone

Yesterday, Walter Pincus reported in The Washington Post about the Defense Department's Counterintelligence Field Activity (CIFA), certainly one of the more mysterious Pentagon agencies, and one that is at the center of the Defense Department's expanded programs aimed at gathering and analyzing intelligence within the United States. 

<snip> 

Well, CIFA already has these authorities, has its own agents, and collects information on common American citizens under the guise of "sabotage" and "force protection" threats to the military. Since 9/11, functions that were previously intended to protect U.S. forces overseas from terrorism and protecti U.S. secrets from spies have been combined in one super-intelligence function that constitutes the greatest threat to U.S. civil liberties since the domestic spying days of the 1970's.


On May 2, 2003, Deputy Secretary of Defense Paul Wolfowitz signed a memorandum (large pdf) directing the military to collect and report "non-validated threat information" relating to U.S. military forces, installations or missions. His memorandum followed from the establishment of the Domestic Threat Working Group after 9/11, the intent of which was to create a mechanism to share low-level domestic "threat information" between the military and intelligence agencies.

 It is the military's equivalent of the FBI and intelligence community's post 9/11 shift, and Wolfowitz directed the sharing of reports on ambiguous activity.  This new reporting mechanism -- called TALON for Threat and Local Observation Notice -- applies to seven reporting categories:
• Non-specific threats
• Surveillance
• Elicitation
• Test of security
• Unusual repetitive activity
• Bomb threats
• Other suspicious activity
More:
http://blogs.washingtonpost.com/earlywarning/2005/11/domestic_milita.html
Printer Friendly | Permalink |  | Top
unhappycamper Donating Member (1000+ posts) Send PM | Profile | Ignore Tue Dec-06-05 06:40 AM
Response to Original message
1. .
Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Tue Apr 30th 2024, 09:27 AM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » Editorials & Other Articles Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC